Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,865 skills, Security & Compliance has 1636 skills

Categories

Showing 12 of 1636 skills

Per page
Downloads
Sort
Security & Complianceyaklang/hack-skills

format-string-exploitation

Format string exploitation playbook. Use when printf-family functions receive user-controlled format strings, enabling arbitrary stack reads (%p/%s), arbitrary memory writes (%n/%hn/%hhn), GOT/hook overwrites, and canary/libc/PIE leaks.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

defi-attack-patterns

DeFi attack pattern playbook. Use when analyzing flash loan attacks, price oracle manipulation, MEV sandwich attacks, governance exploits, bridge vulnerabilities, and token standard edge cases in decentralized finance protocols.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

windows-av-evasion

AV/EDR evasion playbook for Windows. Use when bypassing AMSI, ETW, .NET assembly detection, shellcode execution, process injection, API hooking, and signature-based detection on Windows endpoints.

🇺🇸|EnglishTranslated
4
Security & Compliancemembranedev/application-s...

faraday

Faraday integration. Manage Organizations. Use when the user wants to interact with Faraday data.

🇺🇸|EnglishTranslated
4
Security & Compliancevtexdocs/ai-skills

vtex-io-auth-and-policies

Apply when deciding or implementing permissions and authorization boundaries for VTEX IO apps. Covers manifest policies, outbound-access rules, least-privilege design, and how service routes or integrations map to explicit permissions. Use for deciding who is authorized to call or consume a capability, adding new integrations, exposing protected routes, or reviewing app permissions for overreach or missing access.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

reverse-shell-techniques

Reverse shell techniques playbook. Use when establishing remote shells including language one-liners, encrypted shells (OpenSSL/socat/ncat), web shells, PTY upgrades, file transfer methods, PowerShell shells, and Windows payload generation.

🇺🇸|EnglishTranslated
4
Security & Compliancemarkdown-viewer/skills

security

Create security architecture diagrams using PlantUML syntax with identity, encryption, firewall, and compliance stencil icons. Best for IAM flows, zero-trust architectures, encryption pipelines, compliance auditing, and threat detection. NOT for general cloud infra (use cloud skill) or simple flowcharts (use mermaid).

🇺🇸|EnglishTranslated
4
Security & Compliancedanielmiessler/personal_a...

investigation

OSINT and investigation including people search, company intel, domain lookup, social media discovery, and threat intel. USE WHEN OSINT, due diligence, company intel, background check, find person, people search, domain lookup, entity lookup, threat intel, who is.

🇺🇸|EnglishTranslated
4
Security & Compliancearadotso/trending-skills

bluehammer-vulnerability-poc

Skill for working with the BlueHammer vulnerability proof-of-concept repository, covering build, usage, and code patterns.

🇺🇸|EnglishTranslated
4
Security & Compliancep4nda0s/reverse-skills

rev-unicorn-debug

Debug and emulate specific code fragments or functions using the Unicorn engine. Activate when the user wants to emulate a function with Unicorn, trace binary execution without running the full program, decrypt or decode data by emulating the algorithm, or bypass environment dependencies (JNI, syscalls, libc) during emulation.

🇺🇸|EnglishTranslated
4
Security & Compliancep4nda0s/reverse-skills

rev-symbol

Restore function symbols by analyzing code patterns, strings, constants, and cross-references

🇺🇸|EnglishTranslated
4
Security & Compliancealinaqi/claude-bootstrap

cpg-analysis

Deep code property graph analysis with Joern CPG (AST+CFG+PDG) and CodeQL for control flow, data flow, taint analysis, and security auditing

🇺🇸|EnglishTranslated
4
1...6566676869...137
Page